Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System

Similar documents
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

On Mining Group Patterns of Mobile Users

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

DAG based In-Network Aggregation for Sensor Network Monitoring

A Security Architecture for. Wireless Sensor Networks Environmental

Image Compression through DCT and Huffman Coding Technique

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

Survey on Network Lifetime Enhancement Method

A comprehensive survey on various ETC techniques for secure Data transmission

Some Security Trends over Wireless Sensor Networks

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Binary Coded Web Access Pattern Tree in Education Domain

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

Efficient File Sharing Scheme in Mobile Adhoc Network

Spam Detection Using Customized SimHash Function

International Journal of Advanced Research in Computer Science and Software Engineering

Traffic mining in a road-network: How does the

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding

Efficient Load Balancing Routing in Wireless Mesh Networks

Load-Balancing Enhancement by a Mobile Data Collector in Wireless Sensor Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks

LBN: Load-balancing Network for Data Gathering Wireless Sensor Networks

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

How To Balance Network Load In A Wireless Sensor Network

Storage Optimization in Cloud Environment using Compression Algorithm

Routing Protocols for Wireless Sensor Networks

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Access Control And Intrusion Detection For Security In Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

An Efficient Energy-Aware Coverage- Preserving Hierarchical Routing Protocol for WSN

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

High-Frequency Distributed Sensing for Structure Monitoring

Self-Compressive Approach for Distributed System Monitoring

Keywords Wireless Sensor Network (WSN), Low Energy adaptive Clustering Hierarchy (LEACH), Cuckoo Search, Cluster Head (CH), Base Station (BS).

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

RUBA: Real-time Unstructured Big Data Analysis Framework

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

Using Received Signal Strength Variation for Surveillance In Residential Areas

Research Article ISSN Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Selection of Optimal Discount of Retail Assortments with Data Mining Approach

Efficient Detection of Ddos Attacks by Entropy Variation

Node Degree based Clustering for WSN

A Network Stability Monitoring Mechanism of Cluster-Oriented

Wireless Sensor Network: Improving the Network Energy Consumption

Information Management course

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

MULTIHOP CLUSTERING ALGORITHM FOR LOAD BALANCING IN WIRELESS SENSOR NETWORKS.

KEYWORD SEARCH IN RELATIONAL DATABASES

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Automatic Annotation Wrapper Generation and Mining Web Database Search Result

Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Comparison of Data Mining Techniques for Money Laundering Detection System

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng

Mining Mobile Group Patterns: A Trajectory-Based Approach

International Journal of Emerging Technology & Research

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks

A Network Flow Approach in Cloud Computing

Mobile Network Analysis - Hole Healing

How To Cluster On A Search Engine

DATA COLLECTION SCHEME FOR WIRELESS SENSOR NETWORK WITH MOBILE COLLECTOR

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Event Processing Middleware for Wireless Sensor Networks

Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks

Application of Virtual Instrumentation for Sensor Network Monitoring

A Routing Metric for Load-Balancing in Wireless Mesh Networks

Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors

Data De-Duplication Aware Clustering for Optimized Storage in Wireless Multimedia Sensor Networks

Transcription:

Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System K Adinarayana 1 K Lakshmaiah 2 Madanapalli Institute of Technology and Sciences,Angallu, India, 1 sree.adinarayana@gmail.com, 2 klakshmaiah78@gmail.com Abstract: Natural trend show number of animals forms large social groups and move in regular patterns. We formulate a moving object clustering problem that jointly identifies a group of objects and discovers their movement patterns. Data storage and transmission, task scheduling, and network construction used for that. We have proposed a clustering algorithm to find the group relationships for query and data aggregation efficiency. this work are as follows: First, since the clustering algorithm itself is a centralized algorithm, in this work, we further consider systematically combining multiple local clustering results into a consensus to improve the clustering quality and for use in the update-based tracking network. Second, when a delay is tolerant in the tracking application, a new data management approach is required to offer transmission efficiency, which also motivates this study. We thus define the problem of compressing the location data of a group of moving objects as the group data compression problem. We first introduce our distributed mining algorithm to approach the moving object clustering problem and discover group movement patterns. Then, based on the discovered group movement patterns, we propose a novel compression algorithm to tackle the group data compression problem. Our distributed mining algorithm comprises a Group Movement Pattern Mining (GMPMine) and a Cluster Ensembling (CE) algorithm. It avoids transmitting unnecessary and redundant data by transmitting only the local grouping results to a base station (the sink), instead of all of the moving objects location data. Specifically, the GMPMine algorithm discovers the local group movement patterns by using a novel similarity measure, while the CE algorithm combines the local grouping results to remove inconsistency and improve the grouping quality by using the information theory. Keywords: Data Compression; GMPMine; Distributed Clustering; Object Tracking. 1. INTRODUCTION Recent advances in location-acquisition technologies, such as global positioning systems (GPSs) and wireless sensor networks (WSNs), have fostered many novel applications like object tracking, environmental monitoring, and location-dependent service. These applications generate a large amount of location data, and thus, lead to transmission and storage challenges, especially in resource constrained environments like WSNs. To reduce the data volume, various algorithms have been proposed for data compression and data aggregation. However, the above works do not address application-level semantics, such as the group relationships and movement patterns, in the location data. In object tracking applications, many natural phenomena show that objects often exhibit some degree of regularity in their movements. Discovering the group movement patterns is more difficult than finding the patterns of a single object or all objects, because we need to jointly identify a group of objects and discover their aggregated group movement patterns. However, few of existing approaches consider these issues at once. On the one hand, the temporaland-spatial correlations in the movements of moving objects are modeled as sequential patterns in data mining to discover the frequent movement patterns we first introduce our distributed mining algorithm to approach the moving object clustering problem and discover group movement patterns. then, based on the discovered group movement patterns, we propose a novel compression algorithm to tackle the group data compression problem. Our distributed mining algorithm comprises a Group Movement Pattern Mining (GMPMine) and Cluster Ensembling (CE) algorithms. It avoids transmitting unnecessary and redundant data by transmitting only the local grouping results to a base station (the sink), instead of all of the moving objects location data. Specifically, the GMPMine algorithm discovers the local group movement patterns by using a novel similarity measure, 93

while the CE algorithm combines the local grouping results to remove inconsistency and improve the grouping quality by using the information theory. We develop a novel two-phase and two dimensional algorithms, called 2P2D, which utilizes the discovered group movement patterns shared by the transmitting node and the receiving node to compress data. The constrained resource of WSNs should also be considered in approaching the moving object clustering problem. This is different from previous works, we formulate a moving object clustering problem that jointly identifies a group of objects and discovers their movement patterns. The application-level semantics are useful for various applications, such as data storage and transmission, task scheduling, and network construction. 2. ASSOCIATED WORKS A. Movement Pattern Mining First defined the sequential pattern mining problem and proposed an Apriori-like Algorithm to find the frequent sequential patterns by the Agrawal and Srikant [1]. Pattern Projection method in mining sequential patterns consider by the Han at el and proposed FreeSpan [2], which describes an FP-growth-based algorithm. Chen et al. [3] discover path traversal patterns in a Web environment, while Peng and Chen [4] mine user moving patterns incrementally in a mobile computing system. However, sequential patterns and its variations like [3], do not provide sufficient information for location prediction or clustering. First, they did not offer perfect information for location prediction when time is concerned because they carry no time information between consecutive items second, they consider all objects characteristics, which make the meaningful movement characteristics of individual objects or a group of moving objects inconspicuous and ignored. Third, because a sequential pattern lacks information about its significance regarding to each individual trajectory, they are not fully representative to individual trajectories. In the meantime, Giannotti et al. [5] extract T-patterns from spatiotemporal data sets to provide concise descriptions of frequent movements, and Tseng and Lin [6] proposed the TMPMine algorithm for discovering the temporal movement patterns. B. Clustering Wang et al. [7] transform the location sequences into a transaction-like data on users and based on which to obtain a valid group, but the proposed AGP and VG growth are still Apriori-like or FP-growthbased algorithms that suffer from high computing cost and memory demand. Nanni and Pedreschi [8] proposed a density-based clustering algorithm, which makes use of an optimal time interval and finding the average euclidean distance between each point of two trajectories, for trajectory clustering problem. To cluster sequences, Yang and Wang proposed CLUSEQ [9], which iteratively classify a sequence to a learned model; however the created clusters may lie on top which differentiates their problem from ours. C. Data Compression Data compression can reduce the data space or transmission capacity for resource-constrained applications. Slepian-Wolf[10] distributed source coding uses joint entropy to encode two nodes data individually without sharing any data between them; yet, it requires prior awareness of cross correlations of sources. Related works, such as [11], [12], combine data compression with routing by exploiting cross correlations between sensor nodes to reduce the data size. In [13], a tailed LZW has been proposed to address the memory constraint of a sensor device. Summarization of the original data by regression or linear modeling has been proposed for trajectory data compression [14]. The above works do not address correlations of a group of moving objects, which we exploit to increase the compressibility. 3. PRELIMINARIES A. Network and Location Models A hierarchical architecture provides better coverage and scalability, and also extends the network lifetime of WSNs [15], [16]. A high-end sophisticated sensor node, such as Intel Stargate [17], is assigned as a 94

cluster head (CH) to perform high complexity tasks; while a resource-constrained sensor node, such as Mica2 mote [18], performs the sensing and low complexity tasks. if the movements of an object are regular. To learn the significant movement patterns, we adapt Probabilistic Suffix Tree (PST) [20] for it has the lowest storage requirement among many VMM implementations [21]. PST s low complexity, i.e., O(n) in both time and space [22], also makes it more attractive especially for streaming or resourceconstrained environments [23]. C. Problem Description We devise the problem of this paper as discovering the group movement patterns to compress the location sequences of a group of moving objects for transmission Efficiency. Consider a set of moving objects O={O 1, O 2,, O n } and their associated location sequence data set S={S 1, S 2,., S n }. Fig. 1. (a) The hierarchical- and cluster-based network structure and the data flow of an updatebased tracking network. (b) A horizontal analysis of a two layer network structure with 16 clusters. For the above work, we adopt a hierarchical network structure with K layers, as shown in Fig. 1a, where sensor nodes are grouped in each level and collaboratively gather or relay remote information to a base station called a sink. A sensor cluster is a mesh network of n X n sensor nodes handled by a CH and communicate with each other by using multihop routing [19]. We assume that each node in a sensor cluster has a locally unique ID and denote the sensor IDs by an alphabet. Fig. 1b shows an example of a two-layer tracking network, where each sensor cluster contains 16 nodes identified by ={a, b,,p}. Object tracking is defined as a task of detecting a moving object s location and reporting the location data to the sink periodically at a time interval. B. Variable Length Markov Model (VMM) and Probabilistic Suffix Tree (PST) With the help Variable Length Markov Model (VMM), we model the regularity. The objects next location can predicted based on its preceding locations, if and only Definition 1. Two objects are similar to each other if their movement patterns are similar. Definition 2. A set of objects is recognized as a group if they are highly similar to one another. 4. MINING OF GROUP MOVEMENT PATTERNS We recommend a distributed mining algorithm for moving object clustering problem, which include the CE algorithms and GMPMine. A. The Group Movement Pattern Mining (GMPMine) Algorithm Since the optimization of the graph separation problem is difficult in general, we split the similarity graph in the following way. We influence the HCS cluster algorithm [24] to separation the graph and get the location group information. GMPMine include important steps. First, extract the moving patterns from the location sequences by knowledge PST for each object. Second, our algorithm constructs an undirected, unweighted similarity graph where similar objects share an edge between each other. Third, we select the ensembling result. 95

5. DESIGN OF A COMPRESSION ALGORITHM WITH GROUP MOVEMENT PATTERNS A WSN is self-possessed of a large number of tiny sensor nodes that are install in a remote area for different tasks, some of them are environmental monitoring or wildlife tracking. Such sensor nodes are regularly battery-powered and recharging a large number of them is difficult. Therefore, energy protection is vital among all design issues in WSNs [25], [26]. Because the target objects are moving, preserving energy in WSNs for tracking moving objects is more difficult than in WSNs that monitor motionless phenomena, such as humidity or vibrations. Hence, previous works, such as [27], especially consider movement characteristics of moving objects in their designs to track objects efficiently. And the most energy costly tasks in WSNs is transmission of data, data compression is utilized to reduce the amount of delivered data. To reduce the amount of delivered data, this paper suggests the 2P2D algorithm which leverages the group movement patterns to compress the location sequences of moving objects richly. The algorithm includes the sequence merge phase and the entropy reduction phase to compress location sequences vertically and horizontally. A. Sequence Merge Phase The following wild animals, several moving objects may have cluster relationships and share alike trajectories. Transmitting their location data separately leads to redundancy. Therefore, in this section, we focus on the problem of compressing multiple comparable sequences of a group of moving objects. Fig. 2. An example of the Merge algorithm. (a) Three sequences with high similarity. (b) The merged sequence S. Particularly, specified a collection of n sequences, the items of an S-column are replaced by a single symbol, whereas the items of a D-column are enfolded up between two / symbols. Our algorithm generates a merged sequence containing the same information of the original sequences. In decompressing from the merged sequence, while symbol / is encountered, the items after it are output until the next / symbol. Otherwise, for each item, we repeat it n times to generate the original sequences. Fig. 2b shows the merged sequence S whose length is decreased from 60 items to 48 items such that 12 items are sealed. Algorithm: Sequence Merge Input: a group of sequence {S i 0 i < n} with length L an error bound eb Output: a merged sequence S 0. Initialize ps, S 1. dc_start = 0 2. for 0 j < L 3. = null 4. if is_s-column (S i [j], 0 i < n) then 5. = S 0 [j] 6. else if eb > 0 then 7. = getrs ({S i [j], 0 i < n}, eb) 8. if = = null then 9. if dc_start = = 0 then 10. append (S, / ) 11. dc_start = 1 12. for 0 i < n 13. append (S,S i [j]) 14. else 15. if dc_start = = 1 then 16. append (S, / ) 17. dc_start = 0 96

18. append (S, ) 19. return S Table 1: Description of the Notations Description Notations The alphabet of Sensor IDs. S A location sequence. / The hit symbol that is used to replace a predictable item. A symbol in. S i [j] j th item of S i. Since data with lower entropy require fewer bits for storage and transmission, we replace some items to reduce the entropy without loss of information. We first introduce and define the Hit Item Replacement problem, and then, explore the properties of Shannon s entropy to solve the HIR problem. 6. EXPERIMENTS AND ANALYSIS We implement this paper in c sharp and dot net. To the best of our knowledge, no research work has been committed to discovering data storage, task scheduling and network construction for data compression. Moreover, we use the amount of data in kilobyte (KB) and compression ratio (r) as the evaluation metric, where the compression ratio is defined as the ratio between the uncompressed data size and the compressed data size, i.e., r = uncompressed data size/compressed data size. 7. CONCLUSION In this work, we exploit the characteristics of group movements to discover the information about groups of moving objects in tracking applications. We propose a distributed mining algorithm, which consists of a local GMPMine algorithm and a CE algorithm, to discover group movement patterns. With the discovered information, we devise the 2P2D algorithm, which comprises a sequence merge phase and an entropy reduction phase. Our experimental results show that the proposed compression algorithm effectively reduces the amount of delivered data and enhances compressibility and, by extension, reduces the energy consumption expense for data transmission in WSNs. REFERENCES [1]. R. Agrawal and R. Srikant, Mining Sequential Patterns, Proc.11th Int l Conf. Data Eng., pp. 3-14, 1995. [2]. J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen, U. Dayal, and M. Hsu, Freespan: Frequent Pattern- Projected Sequential Pattern Mining, Proc. ACM SIGKDD, pp. 355-359, 2000. [3]. M.-S. Chen, J.S. Park, and P.S. Yu, Efficient Data Mining for Path Traversal Patterns, Knowledge and Data Eng., vol. 10, no. 2, pp. 209-221, 1998. [4]. W.-C. Peng and M.-S. Chen, Developing Data Allocation Schemes by Incremental Mining of User Moving Patterns in a Mobile Computing System, IEEE Trans. Knowledge and Data Eng., vol. 15, no. 1, pp. 70-85, Jan./Feb. 2003. [5]. F. Giannotti, M. Nanni, F. Pinelli, and D. Pedreschi, Trajectory Pattern Mining, Proc. ACM SIGKDD, pp. 330-339, 2007. [6]. V.S. Tseng and K.W. Lin, Energy Efficient Strategies for Object Tracking in Sensor Networks: A Data Mining Approach, J. Systems and Software, vol. 80, no. 10, pp. 1678-1698, 2007. [7]. Y. Wang, E.-P. Lim, and S.-Y. Hwang, Efficient Mining of Group Patterns from User Movement Data, Data Knowledge Eng., vol. 57,no. 3, pp. 240-282, 2006. [8]. M. Nanni and D. Pedreschi, Time-Focused Clustering of Trajectories of Moving Objects, J. Intelligent Information Systems, vol. 27, no. 3, pp. 267-289, 2006. [9]. J. Yang and W. Wang, CLUSEQ: Efficient and Effective Sequence Clustering, Proc. 19th Int l Conf. Data Eng., pp. 101-112, Mar. 2003. [10]. S.S. Pradhan, J. Kusuma, and K. Ramchandran, Distributed Compression in a Dense Microsensor Network, IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 51-60, Mar. 2002. [11]. A.Scaglione and S.D. Servetto, On the Interdependence of Routing and Data Compression in Multi-Hop Sensor Networks, Proc. Eighth Ann. Int l Conf. Mobile Computing and Networking, pp. 140-147, 2002. [12]. S. Baek, G. de Veciana, and X. Su, Minimizing Energy Consumption in Large-Scale Sensor Networks through Distributed Data Compression 97

and Hierarchical Aggregation, IEEE J. Selected Areas in Comm., vol. 22, no. 6, pp. 1130-1140, Aug. 2004. [13]. C.M. Sadler and M. Martonosi, Data Compression Algorithms for Energy- Constrained Devices in Delay Tolerant Networks, Proc. ACM Conf. Embedded Networked Sensor Systems, Nov. 2006. [14]. Y. Xu and W.-C. Lee, Compressing Moving Object Trajectory in Wireless Sensor Networks, Int l J. Distributed Sensor Networks, vol. 3, no. 2, pp. 151-174, Apr. 2007. [15]. J. Tang, B. Hao, and A. Sen, Relay Node Placement in Large Scale Wireless Sensor Networks, J. Computer Comm., special issue on sensor networks, vol. 29, no. 4, pp. 490-501, 2006. [16]. M. Younis and K. Akkaya, Strategies and Techniques for Node Placement in Wireless Sensor Networks: A Survey, Ad Hoc Networks, vol. 6, no. 4, pp. 621-655, 2008. [17]. Stargate: A Platform x Project, http://platformx.sourceforge.net, 2010. [18]. Mica2 Sensor Board, http://www.xbow.com, 2010. [19]. J.N. Al-Karaki and A.E. Kamal, Routing Techniques in Wireless Sensor Networks: A Survey, IEEE Wireless Comm., vol. 11, no. 6, pp. 6-28, Dec. 2004. [20]. D. Ron, Y. Singer, and N. Tishby, Learning Probabilistic Automata with Variable Memory Length, Proc. Seventh Ann. Conf. Computational Learning Theory, July 1994. [21]. D. Katsaros and Y. Manolopoulos, A Suffix Tree Based Prediction Scheme for Pervasive Computing Environments, Proc. Panhellenic Conf. Informatics, pp. 267-277, Nov. 2005. [22]. A. Apostolico and G. Bejerano, Optimal Amnesic Probabilistic Automata or How to Learn and Classify Proteins in Linear Time and Space, Proc. Fourth Ann. Int l Conf. Computational Molecular Biology, pp. 25-32, 2000. [23]. J. Yang and W. Wang, Agile: A General Approach to Detect Transitions in Evolving Data Streams, Proc. Fourth IEEE Int l Conf. Data Mining, pp. 559-V562, 2004. [24]. E. Hartuv and R. Shamir, A Clustering Algorithm Based on Graph Connectivity, Information Processing Letters, vol. 76, nos. 4-6, pp. 175-181, 2000. [25]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless Sensor Networks: A Survey, Computer Networks, vol. 38, no. 4, pp. 393-422, 2002. [26]. D. Culler, D. Estrin, and M. Srivastava, Overview of Sensor Networks, Computer, special issue on sensor networks, vol. 37, no. 8, pp. 41-49, Aug. 2004. [27]. H.T. Kung and D. Vlah, Efficient Location Tracking Using Sensor Networks, Proc. Conf. IEEE Wireless Comm. and Networking, vol. 3, pp. 1954-1961, Mar. 2003. 98

Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System 99